Patents by Inventor Neeraj Joshi

Neeraj Joshi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090326948
    Abstract: A method, system and computer-usable medium are disclosed for the transcoding of annotated text to speech and audio. Source text is parsed into spoken text passages and sound description passages. A speaker identity is determined for each spoken text passage and a sound element for each sound description passage. The speaker identities and sound elements are automatically referenced to a voice and sound effects schema. A voice effect is associated with each speaker identity and a sound effect with each sound element. Each spoken text passage is then annotated with the voice effect associated with its speaker identity and each sound description passage is annotated with the sound effect associated with its sound element. The resulting annotated spoken text and sound description passages are processed to generate output text operable to be transcoded to speech and audio.
    Type: Application
    Filed: June 26, 2008
    Publication date: December 31, 2009
    Inventors: Piyush Agarwal, Priya B. Benjamin, Kam K. Yee, Neeraj Joshi
  • Publication number: 20090313615
    Abstract: A method for policy-based program optimization of existing software code is performed where the code is segmented into code modules. The optimization is based on a performance policy that defines a target characteristic and a sacrificial characteristic relating to the existing software code and further defines an allowable degradation of the sacrificial characteristic resulting from optimization of the target characteristic. This method may include identifying code modules that contribute to suboptimal performance of the software code with respect to the target characteristic; identifying code transformations that increase performance of the suboptimal code modules with respect to the target characteristic; and optimizing the identified code modules by selectively applying the code transformations in accordance with the performance policy to increase performance of the software code with respect to the target characteristic.
    Type: Application
    Filed: June 16, 2008
    Publication date: December 17, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Neeraj Joshi, David L. Kaminsky
  • Patent number: 7614049
    Abstract: The present invention provides a method, system, and computer program product for the autonomic installation and configuration of an enterprise business process on-demand. The method comprises: providing a business process document for expressing the business process, wherein the business process comprises a plurality of components and a workflow; providing a plurality of installation documents, where each installation document describes an installation of a component of the business process; providing a mapping document for mapping each component of the business process to at least one of the installation documents describing the installation of that component; and provisioning the business process on-demand using the business process document, the installation documents, and the mapping document.
    Type: Grant
    Filed: August 24, 2004
    Date of Patent: November 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: Nanchariah R. Chalasani, Mandar U. Jog, Neeraj Joshi, Balan Subramanian
  • Publication number: 20090177773
    Abstract: A system, method and computer program product for determining policy follow-up action based on user-specified codes are set forth. When determining policy follow up action based upon user specified codes, a policy system receives function templates for permissible actions on a given resource type; each function template is annotated with indications of success and failure; the policy system performs an action on the resource; the policy system receives a status indication (or exception); the status indication is compared against the annotated function template; and, the policy system determines its next action based on that comparison.
    Type: Application
    Filed: January 8, 2008
    Publication date: July 9, 2009
    Inventors: David L. Kaminsky, Neeraj Joshi
  • Publication number: 20090089072
    Abstract: The present invention discloses a solution for managing policy artifacts using a configuration management database (CMDB). Policies can be associated with a number of information technology resources, such as servers, businesses applications and the like. The solution permits automatic tagging of the policies (auto-discovery) as they enter the CMDB. For example, when a policy is added, it can be compared against a set of tagging rules. Multiple rules can match a new policy, which results in multiple tags being added for the policy. The policy specific tags can be optionally indexed for faster searching. Once indexed, the CMDB can support policy and policy tag based queries. In one embodiment, policy artifacts can be manipulated within a CMDB tool in a manner consistent with how the CMDB tool handles configuration items (CIs).
    Type: Application
    Filed: October 2, 2007
    Publication date: April 2, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: PRATIK GUPTA, NEERAJ JOSHI, DAVID L. KAMINSKY, DAVID B. LINDQUIST, BALACHANDAR RAJARAMAN
  • Publication number: 20090049508
    Abstract: A system and method for language-agnostic policy management. At least one policy associated with an event occurrence is identified. At least one policy engine associated with the at least one policy is identified. The at least one policy is evaluated by a policy engine of the associated at least one policy engine.
    Type: Application
    Filed: August 14, 2007
    Publication date: February 19, 2009
    Inventors: David L. Kaminsky, Indrajit Poddar, Neeraj Joshi, A. Steven Krantz
  • Publication number: 20090012997
    Abstract: A configuration management database (CMDB) that associates a policy with a configuration item (CI) in the CMDB. The policy contains an “applies to” field and a “type descriptor”. When a relationship is created between the CI and a second CI in the CMDB, the policy is associated with the second CI.
    Type: Application
    Filed: July 3, 2007
    Publication date: January 8, 2009
    Inventors: Bala Rajaraman, David B. Lindquist, David L. Kaminsky, Neeraj Joshi
  • Publication number: 20070179826
    Abstract: Services of a business process are selected for execution. Ontological data is read from a data source corresponding to sub-process sets of the business process. Each sub-process set comprises at least one service. A first ontological model is generated from the read ontological data. Performance characteristics are read for at least one service. Real time or near real time knowledge information is read regarding resources of a system for executing the business process. A modified ontological model is generated from the read performance characteristics and the real time or near real time system resource knowledge information.
    Type: Application
    Filed: February 1, 2006
    Publication date: August 2, 2007
    Applicant: International Business Machines Corporation
    Inventors: Robert Cutlip, Mandar Jog, Neeraj Joshi
  • Publication number: 20060229925
    Abstract: A method, an apparatus, and computer instructions are provided for automatic discovery and maintenance of business processes in Web services and enterprise development environments. A set of agents are deployed to a set of enterprise containers to collect user function calls and report events to a central business workflow language generator. An event handler collects the events reported and an event grouper groups the events into a single workflow activity. An event correlation engine correlates activities to business workflow language constructions by using a temporal condition handler and a collection counting handler. The temporal condition handler maps activities that are in sequence, in parallel, and are repetitive. The collection counting handler counts the number of times an event is handled. Events and Rules for these events are written on the system based on a variety of business constructs that are particular to given business process definition language.
    Type: Application
    Filed: April 8, 2005
    Publication date: October 12, 2006
    Applicant: International Business Machines Corporation
    Inventors: Nanchariah Chalasani, Mandar Jog, Neeraj Joshi, Balan Subramanian
  • Publication number: 20060059029
    Abstract: The present invention provides a method, system, and computer program product for the autonomic installation and configuration of an enterprise business process on-demand. The method comprises: providing a business process document for expressing the business process, wherein the business process comprises a plurality of components and a workflow; providing a plurality of installation documents, where each installation document describes an installation of a component of the business process; providing a mapping document for mapping each component of the business process to at least one of the installation documents describing the installation of that component; and provisioning the business process on-demand using the business process document, the installation documents, and the mapping document.
    Type: Application
    Filed: August 24, 2004
    Publication date: March 16, 2006
    Applicant: International Business Machines Corporation
    Inventors: Nanchariah Chalasani, Mandar Jog, Neeraj Joshi, Balan Subramanian
  • Publication number: 20060036601
    Abstract: A method, system and apparatus for autonomically configuring a virtual log. In accordance with the present invention, events flowing into the virtual log can be heuristically processed to determine if any events have been lost. When an event is considered to have been lost, the size of the log associated with the event can be increased. Also, the interval in which the virtual log interacts with the associated log can be decreased so as to ensure that the events will not continue to be lost. When a period of time has elapsed during which no events are heuristically determined to have been lost, either or both of the interval and associated log can be adjusted so as to increase the interval and decrease the size of the associated log.
    Type: Application
    Filed: August 9, 2004
    Publication date: February 16, 2006
    Applicant: International Business Machines Corporation
    Inventors: John Dudley, Neeraj Joshi, David Ogle, Balan Subramanian, Brad Topol
  • Publication number: 20050223020
    Abstract: Techniques are disclosed for efficiently analyzing measurement data for business processes (for example, in a service provider environment). Business process-aware modules or “cubes” are created from the measurement data, using features of a spatially-enabled database system. A “drill-down” approach is provided for investigating underlying information for a cube (including lower-level linked cubes). Data types other than cubes, such as planes from which a cube is constructed, may also be analyzed. The disclosed techniques may be used to provide autonomic systems, which are self-aware, at a business process level. That is, based on results of analyzing data represented by a cube, autonomic adjustments may be made. In a service provider environment, the analysis and/or the autonomic adjustments may be directed toward enabling the service provider to avoid jeopardizing commitments in service level agreements (and the revenue loss that may result when the commitments are not met).
    Type: Application
    Filed: March 31, 2004
    Publication date: October 6, 2005
    Applicant: International Business Machines Corporation
    Inventors: Robert Cutlip, Neeraj Joshi
  • Publication number: 20050198527
    Abstract: A method, system, and computer program product for the automatic detection and fixing of security vulnerabilities in both individual software components and across complex, multi-component software solutions. The architecture of the software solution to be monitored is analyzed prior to its being monitored. Data derived from the analysis is used to proactively identify possible ways to attack the software solution. The software solution being monitored and the system on which it runs is periodically scanned, and attacks on it are attempted. A list of possible attacks is continuously updated, for example, in a manner similar to virus signatures provided by virus security companies, and a log is generated describing which attacks were successful and which ones failed.
    Type: Application
    Filed: March 8, 2004
    Publication date: September 8, 2005
    Applicant: International Business Machiness Corporation
    Inventors: David Johnson, Neeraj Joshi, Brent Miller, Daniel Rabinovitz